Difference between revisions of "ISI 2018"
(2 intermediate revisions by the same user not shown) | |||
Line 8: | Line 8: | ||
|End date=2018/11/10 | |End date=2018/11/10 | ||
|Homepage=http://isi18.azurewebsites.net/ | |Homepage=http://isi18.azurewebsites.net/ | ||
+ | |Twitter account=https://twitter.com/ieeeisiconf | ||
|City=Miami | |City=Miami | ||
|State=Florida | |State=Florida | ||
|Country=USA | |Country=USA | ||
+ | |Paper deadline=2018/07/20 | ||
+ | |Workshop deadline=2018/06/22 | ||
+ | |Tutorial deadline=2018/07/31 | ||
+ | |Notification=2018/09/07 | ||
+ | |Camera ready=2018/09/28 | ||
|has general chair=Dongwon Lee | |has general chair=Dongwon Lee | ||
|has program chair=Nitesh Saxena, Ponnurangam Kumaraguru | |has program chair=Nitesh Saxena, Ponnurangam Kumaraguru | ||
|has workshop chair=Kemal Akkaya, Christopher C. Yang | |has workshop chair=Kemal Akkaya, Christopher C. Yang | ||
|has tutorial chair=Jonathan Voris, Siddharth Kaza | |has tutorial chair=Jonathan Voris, Siddharth Kaza | ||
+ | |has Keynote speaker=Engin Kirda, Kathleen M. Carkey | ||
+ | |Attendance fee currency=$ | ||
+ | |On site regular=580 | ||
+ | |Early bird regular=480 | ||
+ | |On site student=450 | ||
+ | |Early bird student=350 | ||
+ | |Registration link=https://www.regonline.com/builder/site/?eventid=2528396 | ||
|Submitted papers=110 | |Submitted papers=110 | ||
|Accepted papers=38 | |Accepted papers=38 | ||
|has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding | |has Proceedings Link=https://ieeexplore.ieee.org/xpl/conhome/8575039/proceeding | ||
}} | }} | ||
− | '' | + | '''IEEE International Conference on Intelligence and Security Informatics 2018''' ('''ISI''') |
==Topics== | ==Topics== | ||
− | + | ||
+ | '''Security Analytics and Threat Intelligence:''' | ||
+ | |||
+ | *Threat pattern models and modelling tools | ||
+ | *Real-time situational awareness | ||
+ | *Intrusion and cybersecurity threat detection and analysis | ||
+ | *Cyber-physical-social system security and incident management | ||
+ | *Computing and networking infrastructure protection | ||
+ | *Crime analysis and prevention | ||
+ | *Forecasting threats and measuring the impact of threats | ||
+ | *Surveillance and intelligence through unconventional means | ||
+ | *Information security management standards | ||
+ | *Information systems security policies | ||
+ | *Mobile and cloud computing security | ||
+ | *Big data analytics for cybersecurity | ||
+ | *Machine learning for cybersecurity | ||
+ | *Artificial Intelligence for cybersecurity | ||
+ | *Resilient cyber infrastructure design and protection | ||
+ | |||
+ | |||
+ | '''Data Science and Analytics in Security Informatics:''' | ||
+ | |||
+ | *Data representation and fusion for security informatics<br> | ||
+ | *Criminal/intelligence information extraction<br> | ||
+ | *Data sharing and information visualization for security informatics<br> | ||
+ | *Web-based intelligence monitoring and analysis<br> | ||
+ | *Spatial-temporal data analysis for crime analysis and security informatics<br> | ||
+ | *Criminal/intelligence machine learning and data mining<br> | ||
+ | *Bio-terrorism tracking, alerting, and analysis<br> | ||
+ | *Digital forensics and computational criminology<br> | ||
+ | *Financial and accounting fraud analysis<br> | ||
+ | *Consumer-generated content and security-related social media analytics<br> | ||
+ | *Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)<br> | ||
+ | *Authorship analysis and identification<br> | ||
+ | *Terrorism related analytical methodologies and software tools<br> | ||
+ | |||
+ | |||
+ | '''Human Behaviour and Factors in Security Applications:''' | ||
+ | |||
+ | *Behaviour issues in information systems security<br> | ||
+ | *HCI and user interfaces of relevance to intelligence and security<br> | ||
+ | *Social impacts of crime and terrorism<br> | ||
+ | *Board activism and influence<br> | ||
+ | *Measuring the effectiveness of counter-terrorism campaigns<br> | ||
+ | *Citizen education and training<br> | ||
+ | *Understanding user behaviour in that has potential security risks<br> | ||
+ | *Security risks about user behaviour in information systems<br> | ||
+ | *Human behaviour modelling, representation and prediction for security applications<br> | ||
+ | |||
+ | |||
+ | '''Organizational, National, and International Issues in Counter-terrorism and other Security Applications:''' | ||
+ | |||
+ | *Best practices in counter-terrorism or security protection<br> | ||
+ | *Information sharing policy and governance<br> | ||
+ | *Privacy, security, and civil liberties issues<br> | ||
+ | *Emergency response and management<br> | ||
+ | *Disaster prevention, detection, and management<br> | ||
+ | *Protection of transportation and communications infrastructure<br> | ||
+ | *Communication and decision support for research and rescue<br> | ||
+ | *Assisting citizens' responses to terrorism and catastrophic events<br> | ||
+ | *Border security<br> | ||
+ | *Accounting and IT auditing<br> | ||
+ | *Corporate governance and monitoring<br> | ||
+ | *Election fraud and political use and abuse<br> | ||
+ | |||
+ | |||
==Important Dates== | ==Important Dates== | ||
+ | |||
+ | Conference Dates: | ||
+ | November 8-10, 2018<br> | ||
+ | |||
+ | Paper Submission: | ||
+ | July 20, 2018 | ||
+ | August 17, 2018 (Extended Deadline)<br> | ||
+ | |||
+ | Workshop Proposal: | ||
+ | June 22, 2018<br> | ||
+ | |||
+ | Tutorial Proposal: | ||
+ | July 31, 2018<br> | ||
+ | |||
+ | Tutorial Proposal Acceptance Notification: | ||
+ | August 15, 2018<br> | ||
+ | |||
+ | Paper Acceptance Notification: | ||
+ | September 7, 2018 | ||
+ | September 14, 2018 (Extended Deadline)<br> | ||
+ | |||
+ | Camera-Ready Papers Due: | ||
+ | September 28, 2018<br> | ||
+ | |||
==Committees== | ==Committees== |
Latest revision as of 08:35, 1 August 2019
ISI 2018 | |
---|---|
2018 IEEE International Conference on Intelligence and Security Informatics
| |
Event in series | ISI |
Dates | 2018/11/08 (iCal) - 2018/11/10 |
Homepage: | http://isi18.azurewebsites.net/ |
Twitter account: | https://twitter.com/ieeeisiconf |
Location | |
Location: | Miami, Florida, USA |
Loading map... | |
Important dates | |
Workshops: | 2018/06/22 |
Tutorials: | 2018/07/31 |
Papers: | 2018/07/20 |
Notification: | 2018/09/07 |
Camera ready due: | 2018/09/28 |
Registration link: | https://www.regonline.com/builder/site/?eventid=2528396 |
Early bird student: | $ 350 / {{{Early bird fee reduced}}} Property "Early bird fee reduced" (as page type) with input value "{{{Early bird fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
On site student: | $ 450 / {{{On site fee reduced}}} Property "On site fee reduced" (as page type) with input value "{{{On site fee reduced}}}" contains invalid characters or is incomplete and therefore can cause unexpected results during a query or annotation process. (reduced)
|
Early bird regular: | $ 480 |
On site regular: | $ 580 |
Papers: | Submitted 110 / Accepted 38 (34.5 %) |
Committees | |
General chairs: | Dongwon Lee |
PC chairs: | Nitesh Saxena, Ponnurangam Kumaraguru |
Workshop chairs: | Kemal Akkaya, Christopher C. Yang |
Seminars Chair: | Jonathan Voris, Siddharth Kaza |
Keynote speaker: | Engin Kirda, Kathleen M. Carkey |
Table of Contents | |
Contents | |
Tweets by https://twitter.com/ieeeisiconf | |
https://twitter.com/ieeeisiconf">Tweets by {{{Twitter account}}}
|
IEEE International Conference on Intelligence and Security Informatics 2018 (ISI)
Topics
Security Analytics and Threat Intelligence:
- Threat pattern models and modelling tools
- Real-time situational awareness
- Intrusion and cybersecurity threat detection and analysis
- Cyber-physical-social system security and incident management
- Computing and networking infrastructure protection
- Crime analysis and prevention
- Forecasting threats and measuring the impact of threats
- Surveillance and intelligence through unconventional means
- Information security management standards
- Information systems security policies
- Mobile and cloud computing security
- Big data analytics for cybersecurity
- Machine learning for cybersecurity
- Artificial Intelligence for cybersecurity
- Resilient cyber infrastructure design and protection
Data Science and Analytics in Security Informatics:
- Data representation and fusion for security informatics
- Criminal/intelligence information extraction
- Data sharing and information visualization for security informatics
- Web-based intelligence monitoring and analysis
- Spatial-temporal data analysis for crime analysis and security informatics
- Criminal/intelligence machine learning and data mining
- Bio-terrorism tracking, alerting, and analysis
- Digital forensics and computational criminology
- Financial and accounting fraud analysis
- Consumer-generated content and security-related social media analytics
- Security-related social network analysis (radicalization, fund-raising, recruitment, conducting operations)
- Authorship analysis and identification
- Terrorism related analytical methodologies and software tools
Human Behaviour and Factors in Security Applications:
- Behaviour issues in information systems security
- HCI and user interfaces of relevance to intelligence and security
- Social impacts of crime and terrorism
- Board activism and influence
- Measuring the effectiveness of counter-terrorism campaigns
- Citizen education and training
- Understanding user behaviour in that has potential security risks
- Security risks about user behaviour in information systems
- Human behaviour modelling, representation and prediction for security applications
Organizational, National, and International Issues in Counter-terrorism and other Security Applications:
- Best practices in counter-terrorism or security protection
- Information sharing policy and governance
- Privacy, security, and civil liberties issues
- Emergency response and management
- Disaster prevention, detection, and management
- Protection of transportation and communications infrastructure
- Communication and decision support for research and rescue
- Assisting citizens' responses to terrorism and catastrophic events
- Border security
- Accounting and IT auditing
- Corporate governance and monitoring
- Election fraud and political use and abuse
Important Dates
Conference Dates:
November 8-10, 2018
Paper Submission:
July 20, 2018
August 17, 2018 (Extended Deadline)
Workshop Proposal:
June 22, 2018
Tutorial Proposal:
July 31, 2018
Tutorial Proposal Acceptance Notification:
August 15, 2018
Paper Acceptance Notification:
September 7, 2018
September 14, 2018 (Extended Deadline)
Camera-Ready Papers Due:
September 28, 2018
Committees
General Chair:
- Dongwon Lee, Pennsylvania State University, USA
Local Chair:
- A. Selcuk Uluagac, Florida International University, USA
Program Co-Chairs:
- Nitesh Saxena, University of Alabama at Birmingham, USA
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, New Delhi, India
Publication Chair:
- Ghita Mezzour, International University of Rabat, Morocco
Finance Chair:
- Fengjun Li, The University of Kansas, USA
Publicity Chair:
- Anna Squicciarini, Pennsylvania State University, USA
Web Chair:
- Leonardo Babun, Florida International University, USA
Workshop Co-Chairs:
- Kemal Akkaya, Florida International University, USA
- Christopher C. Yang, Drexel University, USA
Tutorial Co-Chairs:
- Jonathan Voris, New York Institute of Technology, USA
- Siddharth Kaza, Towson University, USA
Registration Co-Chairs:
- Wingyan Chung, University of Central Florida, USA
- K.P. Chow, The University of Hong Kong, Hong Kong
Registration Specialist:
- Jinwei Liu, University of Central Florida, USA
PROGRAM COMMITTEE
Chairs:
- Ponnurangam Kumaraguru, Indraprastha Institute of Information Technology, Delhi, India
- Nitesh Saxena, University of Alabama at Birmingham, USA
Committee:
- Swati Agarwal, Indraprastha Institute of Information Technology, Delhi, India
- Anupama Aggarwal, Indraprastha Institute of Information Technology, Delhi, India
- Massimiliano Albanese, George Mason University, USA
- S. Abhishek Anand, University of Alabama at Birmingham, USA
- Sandhya Aneja, Institute of Informatics and Communication, University of Delhi, India
- Jie Bai, Chinese Academy of Sciences, China
- Jeremy Blackburn, University of Alabama at Birmingham, USA
- Joel Brynielsson, KTH Royal Institute of Technology, Sweden
- Jose Luis Calvo-Rolle, University of A. Coruña, Spain
- Weiping Chang, Central Police University, Taiwan
- K. P. Chow, The University of Hong Kong, Hong Kong
- Wingyan Chung, University of Central Florida, USA
- Amitava Das, Indian Institute of Information Technology, Sri City, India
- Leon Deligiannidis, Wentworth Institute of Technology, USA
- Norah Dunbar, University of California Santa Barbara, USA
- Guanggang Geng, Chinese Academy of Sciences, China
- Roberto Giacobazzi, University of Verona, Italy
- Anuradha Gupta, Jaypee Institute of Information Technology, India
- Tzipora Halevi, Brooklyn College, USA
- Sue Kase, Army Research Laboratory, USA
- Sergii Kavun, Kharkiv Educational and Scientific Institute of the University of Banking, Ukraine
- Jeroen Keppens, King's College London, UK
- Latifur Khan, University of Texas at Dallas, USA
- Jörn Kohlhammer, Fraunhofer Institute for Computer Graphics Research IGD, Deutschland
- Steve Kramer, Paragon Science, Inc.
- Qiudan Li, Chinese Academy of Sciences, Beijing, China
- Luca Mazzola, Deutsche Forschungszentrum für Künstliche Intelligenz GmbH (DFKI), Germany
- Michael Mcguire, Towson University, USA
- Manar Mohamed, Miami University, USA
- Ajaya Neupane, University of California Riverside, USA
- Greg Newby, Compute Canada
- Cyril Onwubiko, Cyber Security and Intelligence at Research Series Limited
- Andrew Park, Thompson Rivers University, Canada
- Jakub Piskorski, Joint Research Centre of the European Commission, Poland
- Andrea Pugliese, University of Calabria, Italy
- Guangzhi Qu, Oakland University, USA
- Björn Schuller, University of Augsburg / Imperial College London, UK
- Abdul Serwadda, Louisiana Tech University, USA
- Maliheh Shirvanian, University of Alabama at Birmingham, USA
- Babins Shrestha, VISA Inc., Austin, USA
- Gerardo Simari, Universidad Nacional del Sur and CONICET, Argentina
- Yannis Stamatiou, University of Patras, Greece
- Robyn Torok, Edith Cowan University, Australia
- Hien Thi Thu Truong, NEC Labs Europe
- Khan Ferdous Wahid, Airbus Group
- Jenq-Haur Wang, National Taipei University of Technology, Taiwan
- Uffe Wiil, University of Southern Denmark, Denmark
- Christian Wolff, Regensburg University, Germany
- Guobin Xu, Frostburg State University, USA
- Shouhuai Xu, University of Texas at San Antonio, USA
- Qingpeng Zhang, City University of Hong Kong, Hong Kong
- Xiaolong Zheng, Chinese Academy of Sciences, Beijing, China
- Bin Zhou, University of Maryland, USA